Author:
Gennaro Rosario,Jarecki Stanisław,Krawczyk Hugo,Rabin Tal
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. G. Brassard, D. Chaum, and C. Crépeau. Minimum disclosure proofs of knowledge. JCSS, 37(2): 156–189, 1988.
2. Lect Notes Comput Sci;J. Boyar,1991
3. M. Blum and S. Kannan, Program correctness checking and the design of programs that check their work. In Proc. of the 21st ACM Symposium on Theory of Computing, 1989.
4. C. Boyd, Digital Multisignatures. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 241–246, Claredon Press, 1986.
5. M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Eurocrypt’94, 1994.
Cited by
81 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Threshold Cryptography;Encyclopedia of Cryptography, Security and Privacy;2024
2. Threshold and Multi-signature Schemes from Linear Hash Functions;Advances in Cryptology – EUROCRYPT 2023;2023
3. Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem;Innovative Security Solutions for Information Technology and Communications;2023
4. Practical Robust DKG Protocols for CSIDH;Applied Cryptography and Network Security;2023
5. A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes;IEEE Access;2022